Network Protection using Honeypots
D. Rajesh1, M.I. Thariq Hussan2, B. Sri Vastav3

1D. Rajesh*, B. Tech Scholar, Department of Information Technology, Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad, India.
2B. Srivastav, B. Tech Scholar, Department of Information Technology, Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad, India.
3Dr. M.I. Thariq Hussan, Professor and Head, Department of Information Technology, Guru Nanak Institutions Technical Campus, Ibrahimpatnam, Hyderabad, India.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 23, 2020. | Manuscript published on April 10, 2020. | PP: 1911-1916 | Volume-9 Issue-6, April 2020. | Retrieval Number: F3863049620/2020©BEIESP | DOI: 10.35940/ijitee.F3863.049620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: PC Networks and Internet has become acclaimed these days since it fulfills individuals with varying needs by giving assortment of perfect service. Computer Networks have reformed our utilization of PC. Debits, Purchasing from e-commerce and many other needful activities performed by a single click from our homes. In spite of the fact that it is an aid right now, likewise has its own dangers what’s more, shortcomings as well. Enterprises need to tussle to give security to their systems and in reality not conceivable to offer a cent percent security because of the immaterial knowledge of hackers meddling into the network. This paper gives the idea of honeypots for securing the network of the different organizations which might not have custom intrusion detection system or firewalls. The proposed model shows the different techniques utilized by hackers and makes a log of all hackers exercises. Hence utilizing this log, the network can be kept from assailants. . 
Keywords: Honeypot, Network, Intrusion, Honeynet.
Scope of the Article: Advance Concept of Networking and Database